Reference Guide

Configuring an RMON Event......................................................................................................788
Configuring RMON Collection Statistics....................................................................................788
Configuring the RMON Collection History................................................................................789
49 Rapid Spanning Tree Protocol (RSTP)....................................................... 790
Protocol Overview............................................................................................................................790
Configuring Rapid Spanning Tree....................................................................................................790
Related Configuration Tasks.......................................................................................................790
Important Points to Remember................................................................................................. 790
RSTP and VLT...............................................................................................................................791
Configuring Interfaces for Layer 2 Mode......................................................................................... 791
Enabling Rapid Spanning Tree Protocol Globally............................................................................793
Adding and Removing Interfaces............................................................................................... 795
Modifying Global Parameters..................................................................................................... 796
Modifying Interface Parameters..................................................................................................797
Configuring an EdgePort............................................................................................................ 797
Influencing RSTP Root Selection................................................................................................798
Enabling SNMP Traps for Root Elections and Topology Changes........................................... 799
50 Software-Defined Networking (SDN)........................................................ 800
51 Security.............................................................................................................801
AAA Accounting................................................................................................................................ 801
Configuration Task List for AAA Accounting..............................................................................801
AAA Authentication...........................................................................................................................803
Configuration Task List for AAA Authentication........................................................................804
Obscuring Passwords and Keys.......................................................................................................806
AAA Authorization.............................................................................................................................807
Privilege Levels Overview........................................................................................................... 807
Configuration Task List for Privilege Levels............................................................................... 807
RADIUS...............................................................................................................................................811
RADIUS Authentication and Authorization.................................................................................812
Configuration Task List for RADIUS............................................................................................813
TACACS+...........................................................................................................................................816
Configuration Task List for TACACS+........................................................................................ 816
Command Authorization............................................................................................................ 818
Protection from TCP Tiny and Overlapping Fragment Attacks...................................................... 819
Enabling SCP and SSH...................................................................................................................... 819
Using SCP with SSH to Copy a Software Image........................................................................820
Secure Shell Authentication........................................................................................................821
Enabling SSH Authentication by Password................................................................................ 821
Using RSA Authentication of SSH...............................................................................................822